Skip to main content

Design considerations for Metadata Insertion
draft-hardie-privsec-metadata-insertion-02

The information below is for an old version of the document.
Document Type Expired Internet-Draft (individual)
Author Ted Hardie
Last updated 2016-09-21 (Latest revision 2016-03-20)
Stream (None)
Formats
Expired & archived
plain text htmlized pdfized bibtex
Reviews
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-hardie-privsec-metadata-insertion-02.txt

Abstract

The IAB has published [RFC7624] in response to several revelations of pervasive attack on Internet communications. In this document we consider the implications of protocol designs which associate metadata with encrypted flows. In particular, we assert that designs which do so by explicit actions of the end system are preferable to designs in which middleboxes insert them.

Authors

Ted Hardie

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)